CN109635573B - Data distributed encryption and decryption system, method, device, electronic equipment and medium - Google Patents

Data distributed encryption and decryption system, method, device, electronic equipment and medium Download PDF

Info

Publication number
CN109635573B
CN109635573B CN201811340336.7A CN201811340336A CN109635573B CN 109635573 B CN109635573 B CN 109635573B CN 201811340336 A CN201811340336 A CN 201811340336A CN 109635573 B CN109635573 B CN 109635573B
Authority
CN
China
Prior art keywords
data
segment
key
segmented
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811340336.7A
Other languages
Chinese (zh)
Other versions
CN109635573A (en
Inventor
安晓江
胡伯良
蒋红宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Haitai Fangyuan High Technology Co Ltd
Original Assignee
Beijing Haitai Fangyuan High Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Haitai Fangyuan High Technology Co Ltd filed Critical Beijing Haitai Fangyuan High Technology Co Ltd
Priority to CN201811340336.7A priority Critical patent/CN109635573B/en
Publication of CN109635573A publication Critical patent/CN109635573A/en
Application granted granted Critical
Publication of CN109635573B publication Critical patent/CN109635573B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a system, a method, a device, electronic equipment and a medium for data distributed encryption and decryption, wherein the system comprises: the master node is used for receiving an encryption and decryption request for specified data sent by a requester, dividing the specified data into segment data according to a set segment length, determining a segment key of each segment data, and sending the segment data, the segment key and a segment number to at least two slave nodes, wherein the segment keys corresponding to each segment data are different; the at least two slave nodes are used for encrypting and decrypting the segmented data according to the segmented key and sending the encrypted and decrypted segmented data and the segmented number to the master node; and the main node is also used for assembling the encrypted and decrypted segment data into the encrypted and decrypted data according to the segment number and returning the encrypted and decrypted data to the requesting party. The master node uniformly receives the encryption and decryption requests and distributes the segmented data to the slave nodes for encryption and decryption, and the keys of the segmented data are different, so that the risk of key leakage is reduced, and the safety of the data is improved.

Description

data distributed encryption and decryption system, method, device, electronic equipment and medium
Technical Field
the present invention relates to the field of data encryption and decryption technologies, and in particular, to a system, a method, an apparatus, an electronic device, and a medium for distributed data encryption and decryption.
Background
In order to increase the encryption and decryption speed, a distributed encryption and decryption method can be adopted for encrypting and decrypting relatively large data.
In the prior art, for distributed encryption and decryption of data, each distributed node shares the same encryption and decryption key, and for different data encryption and decryption, the encryption and decryption keys are different each time, so that the keys are transmitted between the distributed nodes, and when the keys are transmitted between any two nodes, the keys are leaked, so that the data encryption and decryption are completely cracked, and the risk of key leakage is high.
disclosure of Invention
In view of the above problems, embodiments of the present invention are proposed to provide a system, method, apparatus, electronic device and medium for distributed encryption and decryption of data that overcome or at least partially solve the above problems.
According to a first aspect of the present invention, there is provided a system for distributed encryption and decryption of data, comprising:
The master node is used for receiving an encryption and decryption request for specified data sent by a requester, dividing the specified data into segmented data according to a set segment length, determining a segmentation key corresponding to each segmented data, and sending the segmented data, the segmentation key and a corresponding segmentation number to at least two slave nodes, wherein the segmentation keys corresponding to each segmented data are different;
At least two slave nodes, configured to encrypt and decrypt the segment data according to the segment key, and send the encrypted and decrypted segment data and a corresponding segment number to the master node;
and the main node is also used for assembling the encrypted and decrypted segment data into encrypted and decrypted data according to the segment number and returning the encrypted and decrypted data to the requester.
according to a second aspect of the present invention, there is provided a method of distributed encryption of data, comprising:
when receiving an encryption request of a requester for specified data, a master node generates a key and a corresponding data identifier and stores the key and the corresponding data identifier;
the main node segments the designated data according to the set segment length to obtain segment data, and determines the number of the segments and the segment number of each segment data;
The master node generates random numbers with the same number as the number of the segments according to the set segment length;
The main node determines a segmented key corresponding to each segmented data according to the key and the random number;
The master node sends the segment data, a segment key and corresponding segment numbers to at least two slave nodes to instruct the slave nodes to encrypt the segment data according to the segment key;
The master node receives the encrypted segment data and the corresponding segment numbers returned by the at least two slave nodes;
and the main node assembles the data identifier, the random number and the encrypted segment data into encrypted data according to the segment number, and returns the encrypted data to the requester.
optionally, the determining, by the master node, a segment key corresponding to each segment data according to the key and the random number includes:
And the master node performs preset operation on the random number and the secret key to generate a segmented secret key corresponding to each segmented data.
Optionally, the preset operation includes a Hash operation or an exclusive or operation.
Optionally, the assembling, by the master node, the data identifier, the random number, and the encrypted segment data into encrypted data according to the segment number includes:
And the main node assembles the data identifier, the set segment length, the random number and the encrypted segment data into encrypted data according to the segment number.
According to a third aspect of the present invention, there is provided a method of distributed decryption of data, comprising:
The main node receives a decryption request for specified data sent by a requester;
the main node acquires a corresponding key according to the data identifier in the designated data;
The main node divides the designated data into the segment data and the corresponding random number according to the set segment length, and determines the segment number of each segment data;
the main node determines a segmented key corresponding to each segmented data according to the key and the random number;
The master node sends the segment data, a segment key and corresponding segment numbers to at least two slave nodes to instruct the slave nodes to decrypt the segment data according to the segment key;
the master node receives the decrypted segment data and the corresponding segment numbers returned by the at least two slave nodes;
and the main node assembles the decrypted segment data into decrypted data according to the segment number and returns the decrypted data to the requester.
optionally, the determining, by the master node, a segment key corresponding to each segment data according to the key and the random number includes:
and the master node performs preset operation on the random number and the secret key to generate a segmented secret key corresponding to each segmented data.
Optionally, the preset operation includes a Hash operation or an exclusive or operation.
Optionally, before the master node splits the specified data into the segmented data and the corresponding random number according to a set segment length, the method further includes:
the master node extracts a set segment length in the specified data.
According to a fourth aspect of the present invention, there is provided an apparatus for distributed encryption of data, configured in a master node of a distributed encryption and decryption system according to the first aspect, comprising:
the key generation module is used for generating a key and a corresponding data identifier when receiving an encryption request of a requester for specified data, and storing the key and the corresponding data identifier;
The encryption segmentation module is used for segmenting the specified data according to the set segment length to obtain segment data, and determining the number of the segments and the segment number of each segment data;
a random number generation module, configured to generate random numbers with the same number as the number of the segments according to the set segment length;
The encryption segmentation key determining module is used for determining a segmentation key corresponding to each segmentation data according to the key and the random number;
an encryption information sending module, configured to send the segment data, a segment key, and corresponding segment numbers to at least two slave nodes to instruct the slave nodes to encrypt the segment data according to the segment key;
The encrypted data receiving module is used for receiving the encrypted segment data and the corresponding segment numbers returned by the at least two slave nodes;
And the encrypted data assembling module is used for assembling the data identifier, the random number and the encrypted segment data into encrypted data according to the segment number and returning the encrypted data to the requesting party.
Optionally, the encryption segment key determining module is specifically configured to:
and carrying out preset operation on the random number and the secret key to generate a segmented secret key corresponding to each segmented data.
Optionally, the preset operation includes a Hash operation or an exclusive or operation.
optionally, the encrypted data assembling module is specifically configured to:
and according to the segment number, assembling the data identification, the set segment length, the random number and the encrypted segment data into encrypted data.
according to a fifth aspect of the present invention, there is provided an apparatus for distributed decryption of data, comprising:
The decryption request receiving module is used for receiving a decryption request for specified data sent by a requester;
The key acquisition module is used for acquiring a corresponding key according to the data identifier in the specified data;
the decryption segmentation module is used for splitting the specified data into segment data and corresponding random numbers according to the set segment length and determining the segment number of each segment data;
a decryption segment key determining module, configured to determine, according to the key and the random number, a segment key corresponding to each segment data;
a decryption information sending module, configured to send the segment data, a segment key, and corresponding segment numbers to at least two slave nodes to instruct the slave nodes to decrypt the segment data according to the segment key;
the decrypted data receiving module is used for receiving the decrypted segmented data and the corresponding segmented numbers returned by the at least two slave nodes;
And the decrypted data assembling module is used for assembling the decrypted segment data into decrypted data according to the segment number and returning the decrypted segment data to the requesting party.
optionally, the decryption segment key determining module is specifically configured to:
and carrying out preset operation on the random number and the secret key to generate a segmented secret key corresponding to each segmented data.
Optionally, the preset operation includes a Hash operation or an exclusive or operation.
optionally, the method further includes:
the segment length extraction module is used for extracting the set segment length in the designated data before splitting the designated data into the segment data and the corresponding random number according to the set segment length.
According to a sixth aspect of the present invention, there is provided an electronic apparatus comprising: a processor, a memory and a computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, implements the method of distributed encryption of data as described in the second aspect or the method of distributed decryption of data as described in the third aspect.
according to a seventh aspect of the present invention, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of distributed encryption of data as described in the second aspect or the method of distributed decryption of data as described in the third aspect.
the invention has the following advantages:
The invention provides a system, a method, a device, electronic equipment and a medium for distributed encryption and decryption of data, which receive an encryption and decryption request for specified data sent by a requesting party through a main node, divide the specified data into segment data according to a set segment length, distribute the segment data to at least two slave nodes for encryption and decryption, receive the segment data returned by the slave nodes after encryption and decryption, assemble the segment data into encrypted and decrypted data, return the encrypted and decrypted data to the requesting party, uniformly receive the encryption and decryption request by the main node and distribute the segment data to the slave nodes for encryption and decryption, wherein keys of the segment data are different, so that the risk of key leakage is reduced, and the safety of the data is improved.
the foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention.
Fig. 1 is a block diagram of a distributed data encryption and decryption system according to an embodiment of the present invention;
FIG. 2 is a flow chart illustrating steps of a method for distributed encryption of data according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating steps of a method for distributed data decryption according to an embodiment of the present invention;
Fig. 4 is a block diagram of an apparatus for distributed encryption of data according to an embodiment of the present invention;
Fig. 5 is a block diagram of an apparatus for distributed decryption of data according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the invention are shown in the drawings, it should be understood that the invention can be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
fig. 1 is a block diagram of a data distributed encryption and decryption system according to an embodiment of the present invention, and as shown in fig. 1, the data distributed encryption and decryption system 100 includes a master node 101 and at least two slave nodes 102.
The master node 101 is configured to receive an encryption and decryption request for specified data sent by a requester, divide the specified data into segment data according to a set segment length, determine a segment key corresponding to each segment data, and send the segment data, the segment key, and a corresponding segment number to at least two slave nodes 102, where the segment keys corresponding to each segment data are different;
At least two slave nodes 102, configured to encrypt and decrypt the segment data according to the segment key, and send the encrypted and decrypted segment data and a corresponding segment number to the master node 101;
The master node 101 is further configured to assemble the encrypted and decrypted segment data into encrypted and decrypted data according to the segment number, and return the encrypted and decrypted data to the requester.
the master node 101 is configured to receive an encryption and decryption request of a requester for specified data, and split the specified data into segments, so that the segments can be distributed to at least two slave nodes 102 for distributed encryption and decryption.
When receiving an encryption request of a requester for specified data, the master node 101 generates a key and a corresponding data identifier, and stores the key and the corresponding data identifier; the main node 101 segments the designated data according to the set segment length to obtain segment data, determines the segment number of the segment data, generates random numbers with the same number as the segment number, determines the segment key corresponding to each segment data according to the key and the random numbers, and sends the segment data, the segment key and the corresponding segment number to at least two slave nodes 102; at least two slave nodes 102 encrypt the segment data according to the segment key received by the slave nodes, and return the encrypted segment data and the corresponding segment number to the master node 101; after receiving the encrypted segment data and the corresponding segment numbers returned by all the slave nodes, the master node 101 assembles the data identifier, the set segment length, the random number, and the encrypted segment data into encrypted data according to the segment numbers, and returns the encrypted data to the requester.
when receiving a decryption request of a requester for specified data, the master node 101 acquires a corresponding key according to a data identifier in the specified data, splits the specified data into segment data and a corresponding random number according to a set segment length, determines a segment number of each segment data, determines a segment key corresponding to each segment data according to the key and the random number, and sends the segment data, the segment key and the corresponding segment number to at least two slave nodes 102; the at least two slave nodes 102 decrypt the segmented data according to the received segmented key and return the decrypted segmented data and the corresponding segmented number to the master node 101; after receiving the decrypted segment data and the corresponding segment numbers returned by all the slave nodes, the master node 101 assembles the decrypted segment data into decrypted data according to the segment numbers, and returns the decrypted segment data to the requester.
The distributed encryption and decryption system for data provided by this embodiment receives, by a master node, an encryption and decryption request for specified data sent by a requester, divides the specified data into segment data according to a set segment length, distributes the segment data to at least two slave nodes for encryption and decryption, receives the encrypted and decrypted segment data returned by the slave nodes, assembles the segment data into encrypted and decrypted data, and returns the encrypted and decrypted data to the requester, and the master node uniformly receives the encryption and decryption request and distributes the segment data to the slave nodes for encryption and decryption.
fig. 2 is a flowchart of steps of a method for distributed encryption of data according to an embodiment of the present invention, where the method may be performed by a master node in a system for distributed encryption and decryption of data according to the embodiment, and as shown in fig. 2, the method may include:
Step 201, when receiving an encryption request of a requester for specified data, a master node generates a key and a corresponding data identifier, and stores the key and the corresponding data identifier.
The requesting party is a party that initiates the encryption request, and may be an electronic device such as a computer.
The main node receives an encryption request of a requester for the specified data, can generate a key according to a preset key rule, generates a data identifier of the specified data, stores the key and the corresponding data identifier, and is convenient for inquiring the key corresponding to the data identifier during decryption. The data identifier is a unique identifier of the designated data, and is used for distinguishing the designated data from other data, and may be, for example, a number of the designated data or a data identifier generated according to a preset rule.
and step 202, the master node segments the specified data according to the set segment length to obtain segment data, and determines the number of the segments and the segment number of each segment data.
the set segment length may be a segment length set by a user in advance, or may be a segment length set by the user for the specified data.
The main node divides the designated data into a segment data according to the set segment length, so that the designated data is divided into at least two segment data, the data lengths of other segment data except the last segment data in the at least two segment data are the set segment length, and the data length of the last segment data can be the set segment length or can be smaller than the set segment length. And counting the number of the sections as the number of the sections. The fragment number of each fragment data may be determined according to the order of each fragment data in the specified data.
Step 203, the master node generates the same number of random numbers as the number of the segments according to the set segment length.
the master node may generate a plurality of random numbers having a data length equal to the set segment length, based on the set segment length, the number of generated random numbers being the same as the number of segments. The generated random numbers and the segment data correspond to each other, and may correspond to each other according to their respective orders, for example, the third segment data corresponds to the third random number.
And 204, the master node determines a segmentation key corresponding to each segment data according to the key and the random number.
And the main node performs certain operation on the key and each random number to obtain a segmented key corresponding to each segmented data, wherein the obtained segmented keys of the segmented data are different.
Optionally, the determining, by the master node, a segment key corresponding to each segment data according to the key and the random number includes:
And the master node performs preset operation on the random number and the secret key to generate a segmented secret key corresponding to each segmented data.
the preset operation can optionally comprise a Hash operation or an exclusive-or operation. The Hash operation is to convert an input of arbitrary length into an output of fixed length by a Hash algorithm.
the main node respectively carries out preset operation on the key and each random number so as to generate the segmented key corresponding to each segmented data, and the generated random numbers are different, so that the generated segmented keys are different, and the risk of data leakage is reduced.
step 205, the master node sends the segment data, a segment key and corresponding segment numbers to at least two slave nodes to instruct the slave nodes to encrypt the segment data according to the segment key.
The master node sends the segmented data obtained by splitting, and the segmented keys and the segmented numbers corresponding to the segmented data to at least two slave nodes, so that the slave nodes encrypt the segmented data according to the segmented keys and return the encrypted segmented data and the corresponding segmented numbers to the master node, namely, the specific data encryption work is completed by the slave nodes. A segment data and corresponding segment key and segment number may be sent to a slave node, where the encryption of a segment data is done by a slave node. When the number of segments is greater than the number of slave nodes capable of participating in the operation, each slave node capable of participating in the operation may be first assigned with a segment data and a corresponding segment key and segment number, and after the slave node completes encryption and returns the encrypted segment data, the slave node may be reassigned with a segment data and a corresponding segment key and segment number until all the segment data are completely encrypted.
When the master node sends the segmented data, the segmented key and the corresponding segmented numbers to at least two slave nodes, the master node can also send corresponding random numbers to the at least two slave nodes at the same time, and the corresponding random numbers are returned when the encrypted segmented data are returned after the slave nodes are encrypted, so that the master node does not need to store the random numbers corresponding to the segmented data, and the storage space is saved.
in step 206, the master node receives the encrypted segment data and the corresponding segment numbers returned by the at least two slave nodes.
and step 207, the master node assembles the data identifier, the random number and the encrypted segment data into encrypted data according to the segment number, and returns the encrypted data to the requester.
And after receiving the encrypted segment data and the corresponding segment numbers returned by the at least two slave nodes, the master node assembles the corresponding data identification, the random number and the encrypted segment data into encrypted data according to the segment numbers and the data assembly rule and returns the encrypted data to the requester. For example, the data identifier may be first placed at the beginning of the data, followed by the first segmented data and the corresponding random number, and the second segmented data and the corresponding random number, until all the segmented data and the corresponding random numbers are assembled; or according to the segment number, firstly assembling all the segment data together, and then assembling the corresponding random numbers together according to the corresponding sequence, wherein the data identifier can be placed at the initial position of the assembled data or at the tail end of the assembled data; of course, there are other assembly methods as long as the agreed assembly method can be correctly disassembled during decryption. The data length occupied by the data identifier can be preset, so that the data identifier can be conveniently obtained during decryption.
optionally, the assembling, by the master node, the data identifier, the random number, and the encrypted segment data into encrypted data according to the segment number includes:
and the main node assembles the data identifier, the set segment length, the random number and the encrypted segment data into encrypted data according to the segment number.
when the master node assembles the encrypted segment data, the set segment length can be assembled into the encrypted data, so that the master node does not need to save the set segment length, and the set segment length of each piece of specified data can be different, thereby further improving the safety of the data. The data length occupied by the set segment length and the position in the assembled data can be preset when the data is assembled, so that the set segment length can be conveniently obtained when the data is decrypted. The set segment length may be assembled after the data identifier or before the data identifier.
For example, when the master node receives an encryption request of a requester for specified data D, a key K and a data identification ID are generated, and the ID and K are stored in the master node, then dividing D into segment data according to the set segment length and the number of slave nodes, the number of segments is n, the obtained segment data is (D1, D2, …, Dn) (wherein the first n-1 segments of the segment data are equal in length and are all set segment length L), then n random numbers (S1, S2, …, Sn) for setting the segment length are generated, the (S1, S2, …, Sn) and K are subjected to preset operation (Hash, exclusive OR and the like) to generate segment keys (K1, K2, …, Kn), then (i, Si, Ki, Di) are assembled and sent to a slave node, where i is 1,2, …, n, the slave node encrypts Di using Ki to get Di ', and then sends (i, Si, Di') back to the master node. After receiving replies from all nodes, the master node assembles the encrypted data into D ' (ID, L, S1, D1 ', S2, D2 ', …, Sn, Dn ',) according to the sequence of i, and finally returns the encrypted data D ' to the requester.
The distributed data encryption method provided by this embodiment includes receiving an encryption request of a requester for specified data, generating a key and a corresponding data identifier, and storing the key and the corresponding data identifier, segmenting the specified data according to a set segment length by the master node to obtain segment data, determining the number of segments and the segment number of each segment data, generating random numbers with the same number as the number of segments by the master node, determining a segment key corresponding to each segment data according to the key and the random numbers, sending the segment data, the segment key, and the corresponding segment number to at least two slave nodes, encrypting the segment data by the slave nodes according to the segment keys, receiving the encrypted segment data and the corresponding segment number returned by the slave nodes, and assembling the data identifier, the random numbers, and the encrypted segment data into encrypted data according to the segment number, therefore, only the master node stores the key, the slave nodes only participate in operation, the key leakage risk is reduced, the keys used by each slave node are different, the data of other nodes are not affected after the key of one slave node is leaked, and the data leakage range is reduced.
fig. 3 is a flowchart of steps of a method for distributed data decryption according to an embodiment of the present invention, where the method may be executed by a master node in a data distributed encryption and decryption system provided in the foregoing embodiment, and as shown in fig. 3, the method may include:
In step 301, the host node receives a decryption request for specified data sent by a requester.
the requesting party is a party that initiates an encryption and decryption request, and may be a computer, for example.
The main node uniformly receives a decryption request for specified data sent by a requester.
Step 302, the master node obtains a corresponding key according to the data identifier in the specified data.
the main node acquires the data identifier in the designated data when receiving a decryption request for the designated data sent by a requester, and inquires a key corresponding to the data identifier of the designated data in the corresponding relation between the data identifier stored during encryption and the key according to the data identifier. When the data identifier of the designated data is obtained, the data with the preset data length may be obtained at the start position or the end position of the designated data according to the preset data length of the data identifier, where the data is the data identifier of the designated data.
and 303, the master node splits the specified data into the segmented data and the corresponding random numbers according to the set segment length, and determines the segment number of each segmented data.
the random number is generated by the master node during encryption, the number of the random number is the same as the number of the segmented data, and the random number is a segmented key used for determining each segmented data, so that each segmented key is different. The segment length is set to a segment length set when data is encrypted to form designated data, and may be stored in the master node.
The main node divides the designated data into the segment data and the corresponding random number according to the data assembly rule and the set segment length, and determines the segment number of each segment data according to the sequence of the segment data. For example, when the data assembly rule is that a piece of segment data is next to a corresponding random number in order, the random number corresponding to the piece of segment data can be split after the piece of segment data is split according to the set segment length; the data assembly rule is that after the segment data are assembled in sequence, and then random numbers are assembled in sequence, each segment data and each random number can be firstly split according to a set segment length, and the segment number corresponding to the segment data is determined according to the corresponding sequence of each segment data; of course, there are other splitting rules, which are only examples and are not limiting.
optionally, before the master node splits the specified data into the segmented data and the corresponding random number according to a set segment length, the method further includes:
The master node extracts a set segment length in the specified data.
the set segment length is contained in the designated data, and can be the segment length used for the current encryption, and different set segment lengths can be adopted when other data are encrypted, so that the data security is further improved, and the storage space of the master node is saved.
When decrypting the specified data, the set segment length in the specified data is first extracted, and the set segment length may be extracted from the specified data according to the position of the preset set segment length in the specified data. When the appointed data contains the set segment length, the set segment length used by encryption at each time can be different, so that the set segment length can be directly extracted from the appointed data during decryption, the storage space of the main node is saved, and the safety of the data can be further improved.
And step 304, the master node determines a segment key corresponding to each segment data according to the key and the random number.
And the main node performs certain operation on the key and each random number to obtain a segmented key corresponding to each segmented data, wherein the obtained segmented keys of the segmented data are different.
Optionally, the determining, by the master node, a segment key corresponding to each segment data according to the key and the random number includes:
And the master node performs preset operation on the random number and the secret key to generate a segmented secret key corresponding to each segmented data.
the preset operation can optionally comprise a Hash operation or an exclusive-or operation.
the main node respectively carries out preset operation on the key and each random number so as to generate the segmented key corresponding to each segmented data, and the generated random numbers are different, so that the generated segmented keys are different, and the risk of data leakage is reduced. The rule of the generated segment key is the same as the rule of the segment key generated in encryption, so that correct decryption can be ensured.
step 305, the master node sends the segment data, a segment key and corresponding segment numbers to at least two slave nodes to instruct the slave nodes to decrypt the segment data according to the segment key.
the master node sends the segmented data obtained by splitting, and the segmented key and the segmented number corresponding to the segmented data to at least two slave nodes, so that the slave nodes decrypt the segmented data according to the segmented key and return the decrypted segmented data and the corresponding segmented number to the master node, namely, the specific data decryption work is completed by the slave nodes. A segment data and corresponding segment key and segment number may be sent to a slave node, where the encryption of a segment data is done by a slave node. When the number of segments is greater than the number of slave nodes capable of participating in the operation, each slave node capable of participating in the operation may be first assigned with a segment data and a corresponding segment key and segment number, and after the slave node completes decryption and returns the decrypted segment data, the slave node may be reassigned with a segment data and a corresponding segment key and segment number until all the segment data are completely decrypted.
step 306, the master node receives the decrypted segment data and the corresponding segment numbers returned by the at least two slave nodes.
and 307, the master node assembles the decrypted segment data into decrypted data according to the segment number, and returns the decrypted data to the requester.
For example, when the master node receives a decryption request for the specified data D ' from a requester, the master node acquires the key K based on the data ID, and obtains the random number (S1, S2, …, Sn) and the segment data (D1 ', D2 ', …, Dn ') from D ' based on the set segment length L. And then (S1, S2, …, Sn) and K are subjected to preset operation (Hash, exclusive OR and the like) to generate segmentation keys (K1, K2, …, Kn), then (i, Ki, Di ') is assembled and sent to a slave node, wherein i is 1,2, …, n, and the slave node decrypts Di' by using Ki to obtain Di, and then (i, Di) is sent back to the master node. And after receiving the replies of all the nodes, the main node assembles decrypted data D according to the sequence of the i and finally returns the decrypted data D to the requester.
the distributed data decryption method provided by this embodiment receives a decryption request for specified data sent by a requester, obtains a corresponding key according to a data identifier in the specified data, splits the specified data into segment data and a corresponding random number according to a set segment length, and determines a segment number of each segment data, the master determines a segment key corresponding to each segment data according to the key and the random number, the master sends the segment data, the segment key, and the corresponding segment number to at least two slave nodes, the slave nodes decrypt the segment data according to the segment key, the master receives the decrypted segment data and the corresponding segment numbers returned by the at least two slave nodes, assembles the decrypted segment data into decrypted data according to the segment numbers, and returns the decrypted data to the requester, thereby realizing decryption of the segment data with different keys, therefore, only the master node stores the key, the slave nodes only participate in operation, the key leakage risk is reduced, the keys used by each slave node are different, the data of other nodes are not affected after the key of one slave node is leaked, and the data leakage range is reduced.
it should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the illustrated order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments of the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
fig. 4 is a block diagram of an apparatus for distributed encryption of data according to an embodiment of the present invention, where the apparatus for distributed encryption of data may be configured in a master node of a distributed encryption and decryption system according to an embodiment of the present invention, and as shown in fig. 4, the apparatus 400 for distributed encryption of data may include:
a key generation module 401, configured to generate a key and a corresponding data identifier when receiving an encryption request for specified data from a requester, and store the key and the corresponding data identifier;
an encryption segmentation module 402, configured to segment the specified data according to a set segment length to obtain segment data, and determine the number of segments and a segment number of each segment data;
A random number generation module 403, configured to generate random numbers with the same number as the number of segments according to the set segment length;
An encrypted segment key determining module 404, configured to determine a segment key corresponding to each segment data according to the key and the random number;
An encryption information sending module 405, configured to send the segment data, a segment key, and corresponding segment numbers to at least two slave nodes to instruct the slave nodes to encrypt the segment data according to the segment key;
An encrypted data receiving module 406, configured to receive the encrypted segment data and the corresponding segment numbers returned by the at least two slave nodes;
and the encrypted data assembling module 407 is configured to assemble the data identifier, the random number, and the encrypted segment data into encrypted data according to the segment number, and return the encrypted data to the requesting party.
Optionally, the encryption segment key determining module is specifically configured to:
And carrying out preset operation on the random number and the secret key to generate a segmented secret key corresponding to each segmented data.
Optionally, the preset operation includes a Hash operation or an exclusive or operation.
Optionally, the encrypted data assembling module is specifically configured to:
And according to the segment number, assembling the data identification, the set segment length, the random number and the encrypted segment data into encrypted data.
the distributed data encryption device provided in this embodiment generates a key and a corresponding data identifier and stores the key and the corresponding data identifier when a key generation module receives an encryption request for specified data from a requester, an encryption segmentation module segments the specified data according to a set segment length to obtain segment data and determines the number of the segments and the segment number of each segment data, a random number generation module generates random numbers in the same number as the number of the segments according to the set segment length, an encryption segmentation key determination module determines a segmentation key corresponding to each segment data according to the key and the random numbers, an encryption information transmission module transmits the segment data, the segmentation key, and the corresponding segment number to at least two slave nodes, the slave nodes encrypt the segment data according to the segmentation key, and an encrypted data reception module receives the encrypted segment data and the corresponding segment number returned from the slave nodes, the encrypted data assembly module assembles the data identification, the random number and the encrypted segment data into encrypted data according to the segment number, and returns the encrypted data to the requesting party, so that only the master node stores the key, the slave nodes only participate in operation, the key leakage risk is reduced, the keys used by each slave node are different, the data of other nodes is not influenced after the key of one slave node is leaked, and the data leakage range is reduced.
Fig. 5 is a block diagram of a device for distributed decryption of data according to an embodiment of the present invention, where the device for distributed decryption of data may be configured in a master node of a distributed encryption and decryption system according to an embodiment of the present invention, and as shown in fig. 5, the device 500 for distributed decryption of data may include:
a decryption request receiving module 501, configured to receive a decryption request for specified data sent by a requestor;
A key obtaining module 502, configured to obtain a corresponding key according to the data identifier in the specified data;
A decryption segmentation module 503, configured to split the specified data into segment data and a corresponding random number according to a set segment length, and determine a segment number of each segment data;
a decryption segment key determining module 504, configured to determine, according to the key and the random number, a segment key corresponding to each segment data;
a decryption information sending module 505, configured to send the segment data, the segment key, and the corresponding segment number to at least two slave nodes, so as to instruct the slave nodes to decrypt the segment data according to the segment key;
a decrypted data receiving module 506, configured to receive the decrypted segment data and the corresponding segment numbers returned by the at least two slave nodes;
And a decrypted data assembling module 507, configured to assemble the decrypted segment data into decrypted data according to the segment number, and return the decrypted segment data to the requester.
optionally, the decryption segment key determining module is specifically configured to:
and carrying out preset operation on the random number and the secret key to generate a segmented secret key corresponding to each segmented data.
Optionally, the preset operation includes a Hash operation or an exclusive or operation.
optionally, the method further includes:
the segment length extraction module is used for extracting the set segment length in the designated data before splitting the designated data into the segment data and the corresponding random number according to the set segment length.
the distributed data decryption apparatus provided in this embodiment receives a decryption request for specified data sent by a requestor through a decryption request receiving module, the key obtaining module obtains a corresponding key according to a data identifier in the specified data, the decryption segmentation module splits the specified data into segment data and a corresponding random number according to a set segment length and determines a segment number of each segment data, the decryption segmentation key determining module determines a segmentation key corresponding to each segment data according to the key and the random number, the decryption information sending module sends the segment data, the segmentation keys and the corresponding segment numbers to at least two slave nodes, the slave nodes decrypt the segment data according to the segmentation keys, the decrypted data receiving module receives the decrypted segment data and the corresponding segment numbers returned from the at least two slave nodes, and the decryption data assembling module assembles the decrypted segment data into decrypted data according to the segment numbers, and the key used by each slave node is different, the data of other nodes is not influenced after the key of one slave node is leaked, and the data leakage range is reduced.
for the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
Further, according to an embodiment of the present invention, there is provided an electronic apparatus including: a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program implementing the method for distributed encryption of data or the method for distributed decryption of data of the aforementioned embodiments when executed by the processor.
according to an embodiment of the present invention, there is also provided a computer-readable storage medium including a disk memory, a CD-ROM, an optical memory, and the like, on which a computer program is stored, which when executed by a processor implements the method of data distributed encryption or the method of data distributed decryption of the foregoing embodiments.
the embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
these computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
these computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
the above detailed description is given to a system, a method, an apparatus, an electronic device and a medium for distributed data encryption and decryption provided by the present invention, and a specific example is applied in the present document to explain the principle and the implementation of the present invention, and the description of the above embodiment is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (14)

1. a method for distributed encryption of data, comprising:
When receiving an encryption request of a requester for specified data, a master node generates a key and a corresponding data identifier and stores the key and the corresponding data identifier;
The main node segments the designated data according to the set segment length to obtain segment data, and determines the number of the segments and the segment number of each segment data;
The master node generates random numbers with the same number as the number of the segments according to the set segment length;
The main node determines a segmented key corresponding to each segmented data according to the key and the random number;
The master node sends the segment data, a segment key and corresponding segment numbers to at least two slave nodes to instruct the slave nodes to encrypt the segment data according to the segment key;
the master node receives the encrypted segment data and the corresponding segment numbers returned by the at least two slave nodes;
And the main node assembles the data identifier, the random number and the encrypted segment data into encrypted data according to the segment number, and returns the encrypted data to the requester.
2. the method of claim 1, wherein the determining, by the master node, the segment key corresponding to each segment data according to the key and the random number comprises:
and the master node performs preset operation on the random number and the secret key to generate a segmented secret key corresponding to each segmented data.
3. The method of claim 1, wherein the master node assembles the data identifier, the random number, and the encrypted segment data into encrypted data according to the segment number, and comprises:
And the main node assembles the data identifier, the set segment length, the random number and the encrypted segment data into encrypted data according to the segment number.
4. a method for distributed decryption of data, comprising:
the main node receives a decryption request for specified data sent by a requester;
The main node acquires a corresponding key according to the data identifier in the designated data;
The main node divides the designated data into the segment data and the corresponding random number according to the set segment length, and determines the segment number of each segment data;
The main node determines a segmented key corresponding to each segmented data according to the key and the random number;
The master node sends the segment data, a segment key and corresponding segment numbers to at least two slave nodes to instruct the slave nodes to decrypt the segment data according to the segment key;
The master node receives the decrypted segment data and the corresponding segment numbers returned by the at least two slave nodes;
And the main node assembles the decrypted segment data into decrypted data according to the segment number and returns the decrypted data to the requester.
5. The method of claim 4, wherein the determining, by the master node, the segment key corresponding to each segment data according to the key and the random number comprises:
and the master node performs preset operation on the random number and the secret key to generate a segmented secret key corresponding to each segmented data.
6. the method of claim 4, further comprising, before the master node splits the specified data into segmented data and corresponding random numbers according to a set segment length:
the master node extracts a set segment length in the specified data.
7. An apparatus for distributed encryption of data, configured in a master node of the distributed encryption and decryption system according to claim 1, comprising:
the key generation module is used for generating a key and a corresponding data identifier when receiving an encryption request of a requester for specified data, and storing the key and the corresponding data identifier;
The encryption segmentation module is used for segmenting the specified data according to the set segment length to obtain segment data, and determining the number of the segments and the segment number of each segment data;
a random number generation module, configured to generate random numbers with the same number as the number of the segments according to the set segment length;
The encryption segmentation key determining module is used for determining a segmentation key corresponding to each segmentation data according to the key and the random number;
An encryption information sending module, configured to send the segment data, a segment key, and corresponding segment numbers to at least two slave nodes to instruct the slave nodes to encrypt the segment data according to the segment key;
the encrypted data receiving module is used for receiving the encrypted segment data and the corresponding segment numbers returned by the at least two slave nodes;
And the encrypted data assembling module is used for assembling the data identifier, the random number and the encrypted segment data into encrypted data according to the segment number and returning the encrypted data to the requesting party.
8. The apparatus of claim 7, wherein the cipher-segment-key determination module is specifically configured to:
and carrying out preset operation on the random number and the secret key to generate a segmented secret key corresponding to each segmented data.
9. the apparatus of claim 7, wherein the encrypted data assembly module is specifically configured to:
And according to the segment number, assembling the data identification, the set segment length, the random number and the encrypted segment data into encrypted data.
10. an apparatus for distributed decryption of data, the apparatus being disposed in a master node of the distributed encryption/decryption system according to claim 1, and comprising:
The decryption request receiving module is used for receiving a decryption request for specified data sent by a requester;
The key acquisition module is used for acquiring a corresponding key according to the data identifier in the specified data;
the decryption segmentation module is used for splitting the specified data into segment data and corresponding random numbers according to the set segment length and determining the segment number of each segment data;
a decryption segment key determining module, configured to determine, according to the key and the random number, a segment key corresponding to each segment data;
A decryption information sending module, configured to send the segment data, a segment key, and corresponding segment numbers to at least two slave nodes to instruct the slave nodes to decrypt the segment data according to the segment key;
The decrypted data receiving module is used for receiving the decrypted segmented data and the corresponding segmented numbers returned by the at least two slave nodes;
And the decrypted data assembling module is used for assembling the decrypted segment data into decrypted data according to the segment number and returning the decrypted segment data to the requesting party.
11. The apparatus of claim 10, wherein the decryption segment key determination module is specifically configured to:
And carrying out preset operation on the random number and the secret key to generate a segmented secret key corresponding to each segmented data.
12. The apparatus of claim 10, further comprising:
the segment length extraction module is used for extracting the set segment length in the designated data before splitting the designated data into the segment data and the corresponding random number according to the set segment length.
13. An electronic device, comprising: a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the method of distributed encryption of data according to any one of claims 1 to 3 or the method of distributed decryption of data according to any one of claims 4 to 6.
14. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method of distributed encryption of data according to any one of claims 1 to 3 or the method of distributed decryption of data according to any one of claims 4 to 6.
CN201811340336.7A 2018-11-12 2018-11-12 Data distributed encryption and decryption system, method, device, electronic equipment and medium Active CN109635573B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811340336.7A CN109635573B (en) 2018-11-12 2018-11-12 Data distributed encryption and decryption system, method, device, electronic equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811340336.7A CN109635573B (en) 2018-11-12 2018-11-12 Data distributed encryption and decryption system, method, device, electronic equipment and medium

Publications (2)

Publication Number Publication Date
CN109635573A CN109635573A (en) 2019-04-16
CN109635573B true CN109635573B (en) 2019-12-06

Family

ID=66067835

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811340336.7A Active CN109635573B (en) 2018-11-12 2018-11-12 Data distributed encryption and decryption system, method, device, electronic equipment and medium

Country Status (1)

Country Link
CN (1) CN109635573B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110225028B (en) * 2019-06-10 2021-02-19 电子科技大学 Distributed anti-counterfeiting system and method thereof
CN110704839A (en) * 2019-08-05 2020-01-17 慧镕电子系统工程股份有限公司 Data encryption protection method based on national cryptographic algorithm
CN113645172B (en) * 2020-04-27 2023-01-24 北京圜晖科技有限公司 Three-dimensional model data transmission method, server, user terminal and storage medium
CN112165443B (en) * 2020-08-01 2023-06-02 广东电网有限责任公司广州供电局 Multi-key information encryption and decryption method, device and storage medium
CN112039852B (en) * 2020-08-07 2022-08-05 武汉斗鱼鱼乐网络科技有限公司 Method, storage medium, electronic device and system for protecting core interface
CN112182512A (en) * 2020-09-01 2021-01-05 北京幻想纵横网络技术有限公司 Information processing method, device and storage medium
CN112613055A (en) * 2020-12-24 2021-04-06 山东鑫泰洋智能科技有限公司 Image processing system and method based on distributed cloud server and digital-image conversion
CN113469683B (en) * 2021-06-30 2022-09-27 建信金融科技有限责任公司 Key storage method and device, electronic equipment and storage medium
CN113938270A (en) * 2021-12-17 2022-01-14 北京华云安信息技术有限公司 Data encryption method and device capable of flexibly reducing complexity
CN116010529B (en) * 2023-03-08 2023-08-29 阿里云计算有限公司 Data processing method and system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1307420A (en) * 2000-01-27 2001-08-08 中国长城计算机深圳股份有限公司 Sectional enciphering technology of great-capacity decument
CN101442657A (en) * 2008-12-23 2009-05-27 西安交通大学 Design method for stream medium distributed digital watermarking architecture
CN101594227A (en) * 2008-05-30 2009-12-02 华为技术有限公司 The method of data encryption and deciphering, device and communication system
CN102148798A (en) * 2010-02-04 2011-08-10 上海果壳电子有限公司 Method for efficiently, parallelly and safely encrypting and decrypting high-capacity data packets
CN102402670A (en) * 2011-08-03 2012-04-04 广东欧珀移动通信有限公司 File encryption and decryption method
CN104301094A (en) * 2014-09-11 2015-01-21 江苏集群信息产业股份有限公司 Safe data storage method for distributed type database
CN105763315A (en) * 2014-12-16 2016-07-13 展讯通信(深圳)有限公司 Data encryption and decryption method and apparatus thereof, and communication system
CN105791274A (en) * 2016-02-24 2016-07-20 四川长虹电器股份有限公司 Distributed encrypted storage and authentication method based on local area network
CN106254559A (en) * 2016-10-11 2016-12-21 广东欧珀移动通信有限公司 The method of a kind of information storage and server

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9537657B1 (en) * 2014-05-29 2017-01-03 Amazon Technologies, Inc. Multipart authenticated encryption
US10114969B1 (en) * 2015-08-04 2018-10-30 Jordan White Chaney Ultra-secure blockchain-based electronic information transfer system
CN108052805B (en) * 2017-11-20 2021-07-30 北京旋极信息技术股份有限公司 Data encryption and decryption method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1307420A (en) * 2000-01-27 2001-08-08 中国长城计算机深圳股份有限公司 Sectional enciphering technology of great-capacity decument
CN101594227A (en) * 2008-05-30 2009-12-02 华为技术有限公司 The method of data encryption and deciphering, device and communication system
CN101442657A (en) * 2008-12-23 2009-05-27 西安交通大学 Design method for stream medium distributed digital watermarking architecture
CN102148798A (en) * 2010-02-04 2011-08-10 上海果壳电子有限公司 Method for efficiently, parallelly and safely encrypting and decrypting high-capacity data packets
CN102402670A (en) * 2011-08-03 2012-04-04 广东欧珀移动通信有限公司 File encryption and decryption method
CN104301094A (en) * 2014-09-11 2015-01-21 江苏集群信息产业股份有限公司 Safe data storage method for distributed type database
CN105763315A (en) * 2014-12-16 2016-07-13 展讯通信(深圳)有限公司 Data encryption and decryption method and apparatus thereof, and communication system
CN105791274A (en) * 2016-02-24 2016-07-20 四川长虹电器股份有限公司 Distributed encrypted storage and authentication method based on local area network
CN106254559A (en) * 2016-10-11 2016-12-21 广东欧珀移动通信有限公司 The method of a kind of information storage and server

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘靖 等.一种文件分段加密方法及其应用.《指挥信息系统与技术》.2010,第1卷(第4期),第64-67页. *
熊婷 等.云计算网络数据库中的加密优化模型仿真分析.《科学技术与工程》.2016,第16卷(第21期),第299-302页. *

Also Published As

Publication number Publication date
CN109635573A (en) 2019-04-16

Similar Documents

Publication Publication Date Title
CN109635573B (en) Data distributed encryption and decryption system, method, device, electronic equipment and medium
CN109146481B (en) Method, medium and device for automatically importing account private key of blockchain wallet and blockchain system
CN110278080B (en) Method, system and computer readable storage medium for data transmission
CN112948784B (en) Internet of things terminal identity authentication method, computer storage medium and electronic equipment
CN115688167B (en) Method, device and system for inquiring trace and storage medium
US10169615B2 (en) Methods and apparatuses for encryption and decryption
CN106817358B (en) Encryption and decryption method and device for user resources
CN108038128B (en) Retrieval method, system, terminal equipment and storage medium of encrypted file
CN108471403B (en) Account migration method and device, terminal equipment and storage medium
CN113239403A (en) Data sharing method and device
CN112468297A (en) Key backup method and device based on block chain
CN111144872A (en) Transaction code generation method, transaction code based processing method, device and system
CN115795514A (en) Private information retrieval method, device and system
KR20180113688A (en) Encryption method and system using authorization key of device
CN114338005A (en) Data transmission encryption method and device, electronic equipment and storage medium
CN112860790B (en) Data management method, system and device
CN114499836A (en) Key management method, key management device, computer equipment and readable storage medium
US11088839B2 (en) Generating a plurality of one time tokens
CN111405082B (en) Device connection method, electronic device, terminal and storage medium
JP2007189345A (en) Multiple-key authentication terminal, multiple-key authentication management apparatus, and multiple-key authentication system and program
KR20200091112A (en) Method for sharing information using blockchain technology
CN109871697B (en) Encryption and browsing method and device of electronic file, server, terminal and medium
CN114979253A (en) Data push decision-making method and device
CN113779629A (en) Key file sharing method and device, processor chip and server
CN115174136B (en) Data acquisition and data transmission method, terminal, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant